US20160119375A1 - Cloud security-based file processing method and apparatus - Google Patents
Cloud security-based file processing method and apparatus Download PDFInfo
- Publication number
- US20160119375A1 US20160119375A1 US14/896,298 US201414896298A US2016119375A1 US 20160119375 A1 US20160119375 A1 US 20160119375A1 US 201414896298 A US201414896298 A US 201414896298A US 2016119375 A1 US2016119375 A1 US 2016119375A1
- Authority
- US
- United States
- Prior art keywords
- file
- program file
- unknown program
- unknown
- server end
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H04L67/42—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Definitions
- the invention relates to the field of information security, and in particular, to a cloud security-based file processing method and apparatus.
- the local engine of the client scanning according to a scanning position where it is embedded, and sending features of an unknown program file that can not be identified locally to the cloud security server, the cloud security server comparing the received features of the program file and judging whether it is a malicious program, and if it is a malicious program, the local engine of the client performing corresponding processing on the malicious program according to its preset malicious program processing method.
- the invention provides a cloud security-based file processing method and apparatus to overcome the above problems or at least in part solve the above problems.
- a cloud security-based file processing method comprising:
- the signature related information and the file features are obtained according to the following steps comprising:
- the file features comprise at least one of the following:
- MD5 Message Digest Algorithm 5
- SHA1 Secure Hash Algorithm
- the generating a signature identifier uniquely corresponding to an unknown program file downloaded locally according to signature related information of the unknown program file comprises:
- the computable field is the remaining part in the PE file except the PE check segment, the signature segment and the signature content;
- the performing subsequent process according to the feedback message comprises:
- the detection condition comprises at least one of the following:
- the performing subsequent process according to an instruction of the server end comprises:
- the killing method comprises: a scanning/judging action and/or a repair action.
- a cloud security-based file processing method comprising:
- the query request comprises the signature identifier of an unknown program file and a part or all of the file features of the unknown program file;
- the sending the feedback message to the client comprises:
- the database comprises: a local database and/or a cloud database.
- receiving a query request from a client there is comprised: receiving from the client file features of the unknown program file.
- the sending a corresponding instruction according to the detection result comprises:
- the corresponding command comprises a killing command of killing the unknown program file and a command of releasing a secure file.
- a cloud security-based file processing apparatus comprising:
- a generating module configured to generate a signature identifier uniquely corresponding to an unknown program file downloaded locally according to signature related information of the unknown program file;
- a query module configured to send a query request to a server end to query whether the unknown program file is a malicious program or not, wherein the query request carries the signature identifier of the unknown program file and a part or all of the file features of the unknown program file;
- a processing module configured to receive a feedback message from the server end, and perform subsequent process on the unknown program file according to the feedback message, wherein the server end generates the feedback message according to the signature identifier and the file features.
- the apparatus further comprises:
- an extracting module configured to scan the unknown program file to obtain the file features; and extract the signature related information from the file features.
- the file features comprise at least one of the following:
- the MD5, SHA1, and a feature value calculated according to part of the content extracted from the file are included in the MD5, SHA1, and a feature value calculated according to part of the content extracted from the file.
- the generating module is further configured to:
- the computable field is the remaining part in the PE file except the PE check segment, the signature segment and the signature content;
- processing module is further configured to:
- processing module is further configured to:
- processing module is further configured to:
- the killing method comprises: performing a scanning/judging action and/or a repair action on the unknown program file.
- a cloud security-based file processing apparatus comprising:
- a receiving module configured to receive a query request from a client, wherein the query request comprises the signature identifier of an unknown program file and a part or all of the file features of the unknown program file;
- a sending module configured to generate a feedback message according to the signature identifier and the file features, and send the feedback message to the client, wherein the client performs subsequent process on the unknown program file according to the feedback message.
- the sending module comprises:
- a matching unit configured to match the signature identifier in a database
- a sending unit configured to send a matched killing method to the client.
- the database comprises: a local database and/or a cloud database.
- the receiving module is further configured to receive from the client file features of the unknown program file.
- the sending module is further configured to send a preset detection condition with respect to information parameters of the unknown program file to the client;
- the receiving module is further configured to receive the detection result from the client.
- the sending module is further configured to send a corresponding instruction according to the detection result.
- the sending module is further configured to
- the corresponding command comprises a killing command of killing the unknown program file and a command of releasing a secure file.
- a computer program comprising a computer readable code which causes a computing device to perform the cloud security-based file processing method according to any of claims 1 - 9 , and/or the cloud security-based file processing method according to any of claims 10 - 15 , when said computer readable code is running on the computing device.
- the invention provides a cloud security-based file processing method and apparatus.
- the client can obtain a local unknown program file timely, generate a signature identifier uniquely corresponding to the program file and send it to the server end, and the server end can obtain a corresponding feedback message according to the received signature identifier and return it to the client, and the client performs corresponding process on the unknown program file according to the feedback message.
- the method and apparatus provided by the invention enables the client to obtain a processing method with respect to an unknown program file from the server side in real time and dynamically, and to kill a malicious program timely, which solves the problem of breaking through the cloud killing by utilizing a Trojan in the prior art.
- the invention further reduces the time from discovering a malicious program to killing the malicious program, thereby accelerating the speed of fighting against a new malicious program, reducing the information storage amount of the server as well and in turn guaranteeing the security of a client program.
- FIG. 1 shows a flow chart of a cloud security-based file processing method according to an embodiment of the invention
- FIG. 2 shows a flow chart of another cloud security-based file processing method according to an embodiment of the invention.
- FIG. 3 shows a flow chart of a cloud security-based file processing method according to another embodiment of the invention.
- FIG. 4 shows a structural block diagram of a cloud security-based file processing apparatus according to an embodiment of the invention
- FIG. 5 shows a structural block diagram of another cloud security-based file processing apparatus according to an embodiment of the invention.
- FIG. 6 shows schematically a block diagram of a computing device for performing a cloud security-based file processing method according to the invention.
- FIG. 7 shows schematically a storage unit for retaining or carrying a program code implementing a cloud security-based file processing method according to the invention.
- Invention may be applied in a computer system/server, which may be operated together with a multitude of other general- or special-purpose computing system environments or configurations.
- Examples of well known computing systems, environments and/or configurations suitable for use with a computer system/server comprise, but not limited to, a personal computer system, a server computer system, a thin client, a thick client, a hand held or laptop device, a microprocessor-based system, a set-top box, a programmable consumer electronic product, a network personal computer, a small computer system, a large computer system and a distributed cloud computing environment comprising the any above system, etc.
- a computer system/server may be described in the general context of a computer system executable instruction (such as a program module) executed by a computer system.
- the program module may comprise a routine, a program, target program, component, logic, data structure, etc., which performs a specific task or implements a specific abstract data type.
- the computer system/server may be embodied in a distributed cloud computing environment, and in the distributed cloud computing environment, a task is performed by a remote processing device linked by a communication network.
- the program module may be located on a local or remote computing system storage medium comprising a storage device.
- FIG. 1 shows a flow chart of a cloud security-based file processing method according to an embodiment of the invention.
- the client for processing a local program is improved, and the method specifically comprises the steps S 102 to S 106 .
- S 104 sending a query request to a server end to query whether the unknown program file is a malicious program or not, wherein the query request carries the signature identifier of the unknown program file and a part or all of the file features of the unknown program file.
- the file features in this embodiment may comprise the MD5 value, the SHA1 value of a file, or a feature value calculated according to part of the content extracted from the file. They may further comprise information on a DLL (Dynamic Link Library) that might be loaded by the file and description information on the DLL, whether the file is infected by a Trojan to be a file of which the security is unknown or a dangerous file; or comprise judging whether a specified file/directory exists, whether an attribute of the file meets a condition (for example, whether the MD5 of the file is a specified value), whether a specified registry key/value exists, whether the content of the registry key/value meets a condition, whether a specified process/service exists, or the like.
- a condition for example, whether the MD5 of the file is a specified value
- a specified registry key/value exists, whether the content of the registry key/value meets a condition, whether a specified process/service exists, or the like.
- the security level information determined by the server end may be customized, for example, comprise a level such as secure, dangerous, unknown, etc., or also may be differentiated by employing a way of a first level, a second level, a third level, etc., as long as it can reflect whether an individual module is secure or not.
- the security rank information comprises: the secure level, the unknown level, the suspicious level, the highly suspicious level and the malicious level, wherein the malicious level is the highest level, the secure level is the lowest level.
- a level when it is 10-20 may be set to be the secure level
- a level when it is 30-40 may be set to be the unknown level
- a level when it is 50-60 may be set to be the suspicious level and the highly suspicious level
- a level when it is greater than 70 may be set to be the malicious level.
- S 106 receiving a feedback message from the server end, and performing subsequent process on the unknown program file according to the feedback message, wherein the server end generates the feedback message according to the signature identifier and the file features.
- the feedback message is a killing method fed back by the server end and corresponding to the signature identifier, such that the client can perform corresponding process on the unknown file according to the killing method.
- the cloud security-based file processing method enables the client to obtain a local unknown program file timely, generate a signature identifier uniquely corresponding to the program file and send it to the server end, obtain a corresponding feedback message from the server end, and perform corresponding process on the unknown program file according to the feedback message.
- the method provided by the embodiment of the invention enables the client to obtain a processing method with respect to an unknown program file from the server side in real time and dynamically, and to kill a malicious program timely, which solves the problem of breaking through the cloud killing by utilizing a Trojan in the prior art.
- the method further reduces the time from discovering a malicious program to killing the malicious program, thereby accelerating the speed of fighting against a new malicious program, reducing the information storage amount of the server as well and in turn guaranteeing the security of a client program.
- FIG. 2 shows a flow chart of another cloud security-based file processing method according to an embodiment of the invention.
- the server for killing a malicious program is improved
- the server is a cloud security server for the client above
- the method specifically comprises the steps S 202 to S 206 .
- minizip.dll minizip.dll is replaced with a Trojan
- the server returns a command of deleting the Trojan, and the operation of repairing the Thunder software is performed, which may be performed by the client.
- the cloud security-based file processing method provided by the embodiment of the invention enables the server to obtain a corresponding feedback message according to the signature identifier of an unknown program file sent by the client and return it to the client, and the client performs corresponding process on the unknown program file according to the feedback message
- the method provided by the embodiment of the invention enables the server to obtain a processing method with respect to an unknown program file of the client in real time and dynamically, and the client kills a malicious program, which solves the problem of breaking through the cloud killing by utilizing a Trojan in the prior art.
- the method further reduces the time from discovering a malicious program to killing the malicious program, thereby accelerating the speed of fighting against a new malicious program, reducing the information storage amount of the server as well and in turn guaranteeing the security of a client program.
- FIG. 3 shows a flow chart of a cloud security-based file processing method in an embodiment of the invention.
- the method specifically comprises the step S 302 to S 316 .
- S 302 a client generates a signature identifier uniquely corresponding to an unknown program file downloaded locally according to signature related information of the unknown program file.
- the client when executing a local program file, the client will judge whether each program file is a local known program file to guarantee the knowability of a local program to the client and meanwhile ensure the security of a local program.
- a list of program files will be stored in the client, and when a scanned program file is not in the list of program files, the client will judge the program file to be an unknown program file.
- a specific way of implementing the step comprises:
- the signature related information is the computable field of the file features, and the computable field comprises the remaining part in a PE file except the PE check segment, the signature segment and the signature content, wherein when the length of the obtained file does not reach an integer multiple of 8, the number of bits that it lacks is supplemented with 0 to facilitate its computation;
- the computable field is taken as a digest value, and it is computed employing the SHA1 algorithm to obtain a signature identifier uniquely corresponding to the unknown program file.
- the client After generating the signature identifier of the unknown program file, the client performs the step S 304 , namely, sends a query request to a server end.
- the query request carries the signature identifier of the unknown program file and a part or all of the file features of the unknown program file.
- the server end After receiving the query request, the server end performs the step S 306 , that is, matches the signature identifier in the query request in a database to obtain a killing method corresponding to the signature identifier.
- the database in this embodiment comprises a local database and/or a cloud database.
- the killing method in this embodiment may comprise a scanning/judging action and a repair action, etc.
- the scanning/judging action comprises scanning and judging an attribute of a program file and the context of the program file, and when it is judged to be a malicious program, performing a corresponding repair operation.
- the repair operation may comprise deleting a specified registry key/value, modifying a registry key/value to be specified content, deleting a specified system service item, repairing/deleting a specified program file, etc., and further comprises guiding a user to start a first aid kit, etc., for example, killing a malicious program in the first aid kit mode, employing a multilayer detection and removal way for the computer basic input/output system ⁇ the hard disk master boot record ⁇ the operating system driver layer ⁇ the operating system application layer, to perform detection and removal process on a virus starting from the bottom layer, which may ensure thorough removal of viruses existing in individual layers from the application layer to the driver layer, improve the ability of detecting and removing a computer virus and guarantee the security of the computer system.
- the client After receiving the killing method sent by the server, the client performs the step S 310 , that is, downloads from the server side a detection condition with respect to information parameters of the unknown program file, wherein the detection condition is generated by the server side according to received information parameters (e.g., the file features) of the unknown program file.
- the detection condition is generated by the server side according to received information parameters (e.g., the file features) of the unknown program file.
- the client After downloading the detection condition, the client performs the step S 312 , that is, judges whether the unknown program file meets the detection condition, and sends the judgment result to the server.
- the detection condition in this embodiment comprises at least one of the following:
- the process chain comprises all the parent/child processes that run the program operations.
- an example of a process chain is: process 1 ⁇ process 2 ⁇ process 3, that is, the process 2 is the parent process of the process 3, the process 1 is the parent process of the process 2, the process 2 is the child process of the process 1, and the process 3 is the child process of the process 2.
- Names of all the processes on the process chain are extracted to determine whether a local unknown file exists.
- a parent process and a child process when creating a process, a function that is created is a child process of the creating function.
- the information on the process may further comprise other information, for example, the session ID, the priority, a possessed thread, the user's ID, the handler, the process memory counter, the process path, the process command line parameter, the process name, the process creator, the creation time, the exit time, the kernel time, etc., and the invention will not introduce it in detail any more.
- the process chain corresponding to the current process is traced according to the creation relationship, a parent process at each level is searched successively in the process chain, and the file rank of the parent process is obtained; according to the obtained file rank, it can be known whether a local unknown file exists in the process chain loaded by the PE.
- the second kind of detection condition for example, it is detected that kernel32.dll has been loaded, the internal name is kernel32, the company name is Microsoft, the product name is Microsoft@Windows@Operating System, and so on.
- a shutdown callback hook function is one or more callback function that will be invoked when Windows is shut down, and after a Trojan is registered, it may write itself from the memory to a disk and set self-startup at the time of shutdown, such that it still can be loaded when the computer is powered on the next time.
- a common Trojan sample Unifade can be infected repeatedly by registering a shutdown callback hook.
- svchost.ext is a common system service process
- a Trojan will inject its own module into the process remotely, delete its own file to achieve the purpose of stealth, and write itself to a disk at the time of shutdown so as to be loaded when the computer is powered on the next time.
- An analyzer may extract some binary strings according to features of a Trojan, match these binary strings with the memory of the svchost.exe process and thereby find out the Trojan.
- the fips driver is loaded by the key HKLM ⁇ SYSTEM ⁇ CurrentControlSet ⁇ Services ⁇ Fips, thereby detecting that fips.sys is infected, and meanwhile the object ⁇ Driver ⁇ fips exists, which may be taken as a condition for judging that the ghost Trojan virus exists, and so on.
- the server After receiving the detection result, the server performs the step S 314 , that is, obtains a corresponding instruction according to the detection result, and sends the instruction to the client.
- a list of instructions or an instruction database is stored at the server side, which stores processing instructions for different detection results.
- the server judges that the unknown program file is a malicious file according to the received detection result, it may send to the client a reminder message that the unknown program file might be infected with a malicious program, or also may send an instruction of killing the unknown program file.
- the server judges that the unknown program file is a secure file according to the received detection result, it sends to the client a command of releasing the secure file.
- the client After receiving the instruction sent by the server, the client performs the step S 316 , that is, performs subsequent process on the unknown program file according to the obtained instruction.
- the instruction received by the client when the instruction received by the client is a reminder message that the unknown program file might be infected with a malicious program, it may show the user reminder information that the unknown program file might be infected with a malicious program, to facilitate the user to perform an operation on the program file.
- the user may choose to kill the program file according to the reminder message, and at this point, after receiving a killing instruction triggered by the user, the client forwards the program file to the server side for killing, which reduces the killing operation of the file by the client and increases the processing speed of the client.
- the instruction received by the client When the instruction received by the client is a killing instruction, it directly kills the unknown program file according to the instruction, which guarantees timely killing of a malicious program.
- the invention provides a cloud security-based file processing method.
- the client can obtain a local unknown program file timely, generate a signature identifier uniquely corresponding to the program file and send it to the server end, and the server end can obtain a corresponding feedback message according to the received signature identifier and return it to the client, and the client performs corresponding process on the unknown program file according to the feedback message.
- the method provided by the invention enables the client to obtain a processing method with respect to an unknown program file from the server side in real time and dynamically, and to kill a malicious program timely, which solves the problem of breaking through the cloud killing by utilizing a Trojan in the prior art.
- a problem is solved that a Trojan uses a DLL hijacking technique to pack a Trojan DLL and a trustable white program together and when the user executes the white program, the Trojan DLL will be loaded.
- the method further reduces the time from discovering a malicious program to killing the malicious program, thereby accelerating the speed of fighting against a new malicious program, reducing the information storage amount of the server as well and in turn guaranteeing the security of a client program.
- the method may be effectively applied to a virus that infects the application layer or the driver layer, and involved viruses that may be processed comprise computer viruses (comprising a general infectious virus, a Word and Excel macro virus, a boot sector virus, a script virus, a Trojan, a backdoor program, a keylogger, a password stealer, etc., which are collectively called “computer viruses”).
- FIG. 4 shows a structural block diagram of a cloud security-based file processing apparatus in an embodiment of the invention.
- the apparatus is implemented in an engine of a client.
- the apparatus 400 comprises:
- a generating module 410 configured to generate a signature identifier uniquely corresponding to an unknown program file downloaded locally according to signature related information of the unknown program file;
- a query module 420 coupled with the generating module 410 and configured to send a query request to a server end to query whether the unknown program file is a malicious program or not, wherein the query request carries the signature identifier of the unknown program file and a part or all of the file features of the unknown program file;
- a processing module 430 coupled with the query module 420 and configured to receive a feedback message from the server end, and perform subsequent process on the unknown program file according to the feedback message, wherein the server end generates the feedback message according to the signature identifier and the file features.
- the apparatus further comprises:
- an extracting module 440 coupled with the generating module 410 and configured to scan the unknown program file to obtain the file features
- the file features comprise at least one of the following:
- the MD5, SHA1, and a feature value calculated according to part of the content extracted from the file are included in the MD5, SHA1, and a feature value calculated according to part of the content extracted from the file.
- the generating module 410 is further configured to:
- the computable field is the remaining part in the PE file except the PE check segment, the signature segment and the signature content;
- processing module 430 is further configured to:
- processing module 430 is further configured to:
- processing module 430 is further configured to:
- the killing method comprises: performing a scanning/judging action and/or a repair action on the unknown program file.
- FIG. 5 shows a structural block diagram of another cloud security-based file processing apparatus in an embodiment of the invention.
- the apparatus is implemented in a peer server of the client.
- the apparatus 500 comprises:
- a receiving module 510 configured to receive a query request from a client, wherein the query request comprises the signature identifier of an unknown program file and a part or all of the file features of the unknown program file;
- a sending module 520 coupled with the receiving module 510 and configured to generate a feedback message according to the signature identifier and the file features, and send the feedback message to the client, wherein the client performs subsequent process on the unknown program file according to the feedback message.
- the sending module 520 comprises:
- a matching unit 521 configured to match the signature identifier in a database
- a sending unit 522 configured to send a matched killing method to the client.
- the database comprises: a local database and/or a cloud database.
- the receiving module 510 is further configured to receive from the client file features of the unknown program file.
- the sending module 520 is further configured to send a preset detection condition with respect to information parameters of the unknown program file to the client;
- the receiving module 510 is further configured to receive the detection result from the client.
- the sending module 520 is further configured to sending a corresponding instruction according to the detection result.
- the sending module 520 is further configured to
- the corresponding command comprises a killing command of killing the unknown program file and a command of releasing a secure file.
- the embodiment of the invention provides a cloud security-based file processing apparatus.
- the client can obtain a local unknown program file timely, generate a signature identifier uniquely corresponding to the program file and send it to the server end, and the server end can obtain a corresponding feedback message according to the received signature identifier and return it to the client, and the client performs corresponding processing on the unknown program file according to the feedback message.
- the apparatus enables the client to obtain a processing method with respect to an unknown program file from the server side in real time and dynamically, and to kill a malicious program timely, which solves the problem of breaking through the cloud killing by utilizing a Trojan in the prior art.
- the apparatus further reduces the time from discovering a malicious program to killing the malicious program, thereby accelerating the speed of fighting against a new malicious program, reducing the information storage amount of the server as well and in turn guaranteeing the security of a client program.
- modules in a device in an embodiment may be changed adaptively and arranged in one or more device different from the embodiment.
- Modules or units or assemblies may be combined into one module or unit or assembly, and additionally, they may be divided into multiple sub-modules or sub-units or subassemblies. Except that at least some of such features and/or procedures or units are mutually exclusive, all the features disclosed in the specification (including the accompanying claims, abstract and drawings) and all the procedures or units of any method or device disclosed as such may be combined employing any combination. Unless explicitly stated otherwise, each feature disclosed in the specification (including the accompanying claims, abstract and drawings) may be replaced by an alternative feature providing an identical, equal or similar objective.
- Embodiments of the individual components of the invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof. It will be appreciated by those skilled in the art that, in practice, some or all of the functions of some or all of the components in a cloud security-based file processing apparatus according to individual embodiments of the invention may be realized using a microprocessor or a digital signal processor (DSP).
- DSP digital signal processor
- the invention may also be implemented as a device or apparatus program (e.g., a computer program and a computer program product) for carrying out a part or all of the method as described herein.
- Such a program implementing the invention may be stored on a computer readable medium, or may be in the form of one or more signals. Such a signal may be obtained by downloading it from an Internet website, or provided on a carrier signal, or provided in any other form.
- the invention shows a computing device which may carry out a first cloud security-based file processing method according to the invention, e.g., a client, and a computing device which may carry out a second cloud security-based file processing method according to the invention, e.g., a common application server.
- the computing device traditionally comprises a processor 610 and a computer program product or a computer readable medium in the form of a memory 620 .
- the memory 620 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read-only memory), an EPROM, a hard disk or a ROM.
- the memory 620 has a memory space 630 for a program code 631 for carrying out any method steps in the methods as described above.
- the memory space 630 for a program code may comprise individual program codes 631 for carrying out individual steps in the above methods, respectively.
- the program codes may be read out from or written to one or more computer program products. These computer program products comprise such a program code carrier as a hard disk, a compact disk (CD), a memory card or a floppy disk.
- Such a computer program product is generally a portable or stationary storage unit as described with reference to FIG. 7 .
- the storage unit may have a memory segment, a memory space, etc. arranged similarly to the memory 620 in the server of FIG. 6 .
- the program code may for example be compressed in an appropriate form.
- the storage unit comprises a computer readable code 631 ′, i.e., a code which may be read by e.g., a processor such as 610 , and when run by a computing device, the codes cause the computing device to carry out individual steps in the methods described above.
- a computer readable code 631 ′ i.e., a code which may be read by e.g., a processor such as 610 , and when run by a computing device, the codes cause the computing device to carry out individual steps in the methods described above.
- any reference sign placed between the parentheses shall not be construed as limiting to a claim.
- the word “comprise” does not exclude the presence of an element or a step not listed in a claim.
- the word “a” or “an” preceding an element does not exclude the presence of a plurality of such elements.
- the invention may be implemented by means of a hardware comprising several distinct elements and by means of a suitably programmed computer. In a unit claim enumerating several apparatuses, several of the apparatuses may be embodied by one and the same hardware item. Use of the words first, second, and third, etc. does not mean any ordering. Such words may be construed as naming.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Debugging And Monitoring (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
- The invention relates to the field of information security, and in particular, to a cloud security-based file processing method and apparatus.
- Nowadays, with the increasing growth of malicious programs, the traditional way of killing a virus in which the killing is done based on a feature code and a virus library is updated regularly already can not deal with such a situation, which promotes the rise of a cloud security technology in which a large number of clients track, and kill malicious programs.
- Most of the cloud security technologies in the prior art employ a way of combining a local engine of a client and a cloud security server side, and in particular kill a malicious program by the following way:
- the local engine of the client scanning according to a scanning position where it is embedded, and sending features of an unknown program file that can not be identified locally to the cloud security server, the cloud security server comparing the received features of the program file and judging whether it is a malicious program, and if it is a malicious program, the local engine of the client performing corresponding processing on the malicious program according to its preset malicious program processing method.
- However, when an author of a malicious program antagonizes security software, in order to evade the detection of security protection software, the malicious software will find out a new available point in an operating system or find out a point that is disregarded by the security software, thereby bypass the detection and killing of the security software. Thus, it is necessary for a security manufacturer to analyze samples of new malicious programs so as to update security software of the client. However, in the procedure of upgrading the security software, the malicious program has already been widely spread. It is thus clear that the methods of the prior art can not timely detect and kill a malicious program.
- In view of the above problems, the invention provides a cloud security-based file processing method and apparatus to overcome the above problems or at least in part solve the above problems.
- According to an aspect of the invention, there is provided a cloud security-based file processing method comprising:
- generating a signature identifier uniquely corresponding to an unknown program file downloaded locally according to signature related information of the unknown program file;
- sending a query request to a server end to query whether the unknown program file is a malicious program or not, wherein the query request carries the signature identifier of the unknown program file and a part or all of the file features of the unknown program file; and
- receiving a feedback message from the server end, and performing subsequent process on the unknown program file according to the feedback message, wherein the server end generates the feedback message according to the signature identifier and the file features.
- Optionally, the signature related information and the file features are obtained according to the following steps comprising:
- scanning the unknown program file to obtain the file features; and
- extracting the signature related information from the file features.
- Optionally, the file features comprise at least one of the following:
- the MD5 (Message Digest Algorithm 5), SHA1 (Secure Hash Algorithm), and a feature value calculated according to part of the content extracted from the file.
- Optionally, the generating a signature identifier uniquely corresponding to an unknown program file downloaded locally according to signature related information of the unknown program file comprises:
- obtaining the computable field of a portable executable PE file, wherein the computable field is the remaining part in the PE file except the PE check segment, the signature segment and the signature content; and
- computing the computable field and taking the computation result as the signature identifier.
- Optionally, the performing subsequent process according to the feedback message comprises:
- receiving a killing method fed back by the server end and corresponding to the signature identifier when the signature identifier is matched at the server end successfully.
- Optionally, after receiving a killing method fed back by the server end, there is comprised:
- downloading from the server end a preset detection condition with respect to information parameters of the unknown program file, and judging whether the unknown program file meets the detection condition; and
- uploading the judgment result to the server end and performing subsequent process according to an instruction of the server end.
- Optionally, the detection condition comprises at least one of the following:
- whether a specific file loaded by the PE has an effective signature of a specific company;
- whether the internal name, product name and company name of a specific file loaded by the PE are specified names;
- whether a specific hook is mounted in the system;
- whether there is specific filling data Shellcode in a specific process;
- whether there exists a specific driver module or device object in the system;
- whether a specific registry points to a specific file or a specific unique identifier CLSID or matches a specific mode; and
- whether a file of which the security is unknown exists in a process chain loaded by the PE.
- Optionally, the performing subsequent process according to an instruction of the server end comprises:
- receiving from the server end a reminder message that the unknown program file might be infected with a malicious program; and/or
- killing the unknown program file when receiving from the server end a killing command of killing the unknown program file; and/or
- killing the unknown program file by the server end when receiving a killing instruction triggered in a user interface.
- Optionally, the killing method comprises: a scanning/judging action and/or a repair action.
- According to an aspect of the invention, there is further provided a cloud security-based file processing method comprising:
- receiving a query request from a client, wherein the query request comprises the signature identifier of an unknown program file and a part or all of the file features of the unknown program file;
- generating a feedback message according to the signature identifier and the file features;
- sending the feedback message to the client, wherein the client performs subsequent process on the unknown program file according to the feedback message.
- Optionally, the sending the feedback message to the client comprises:
- matching the signature identifier in a database; and
- returning a matched killing method to the client.
- Optionally, the database comprises: a local database and/or a cloud database.
- Optionally, before the receiving a query request from a client, there is comprised: receiving from the client file features of the unknown program file.
- Optionally, after the returning a matched killing method to the client, there is further comprised:
- sending a preset detection condition with respect to information parameters of the unknown program file to the client;
- receiving the detection result from the client; and
- sending a corresponding instruction according to the detection result.
- Optionally, the sending a corresponding instruction according to the detection result comprises:
- sending to the client a reminder message that the unknown program file might be infected with a malicious program according to the detection result; and/or
- sending a corresponding command according to the detection result, wherein the corresponding command comprises a killing command of killing the unknown program file and a command of releasing a secure file.
- According to another aspect of the invention, there is provided a cloud security-based file processing apparatus comprising:
- a generating module configured to generate a signature identifier uniquely corresponding to an unknown program file downloaded locally according to signature related information of the unknown program file;
- a query module configured to send a query request to a server end to query whether the unknown program file is a malicious program or not, wherein the query request carries the signature identifier of the unknown program file and a part or all of the file features of the unknown program file; and
- a processing module configured to receive a feedback message from the server end, and perform subsequent process on the unknown program file according to the feedback message, wherein the server end generates the feedback message according to the signature identifier and the file features.
- Optionally, the apparatus further comprises:
- an extracting module configured to scan the unknown program file to obtain the file features; and extract the signature related information from the file features.
- Optionally, the file features comprise at least one of the following:
- the MD5, SHA1, and a feature value calculated according to part of the content extracted from the file.
- Optionally, the generating module is further configured to:
- obtain the computable field of a portable executable PE file, wherein the computable field is the remaining part in the PE file except the PE check segment, the signature segment and the signature content; and
- compute the computable field and take the computation result as the signature identifier.
- Optionally, the processing module is further configured to:
- receive a killing method fed back by the server end and corresponding to the signature identifier when the signature identifier is matched at the server end successfully.
- Optionally, the processing module is further configured to:
- download from the server end a preset detection condition with respect to information parameters of the unknown program file, and judge whether the unknown program file meets the detection condition; and
- upload the judgment result to the server end and perform subsequent process according to an instruction of the server end.
- Optionally, the processing module is further configured to:
- receive from the server end a reminder message that the unknown program file might be infected with a malicious program; and/or
- kill the unknown program file when receiving from the server end a killing command of killing the unknown program file; and/or
- kill the unknown program file by the server end when receiving a killing instruction triggered in a user interface.
- Optionally, the killing method comprises: performing a scanning/judging action and/or a repair action on the unknown program file.
- According to another aspect of the invention, there is further provided a cloud security-based file processing apparatus comprising:
- a receiving module configured to receive a query request from a client, wherein the query request comprises the signature identifier of an unknown program file and a part or all of the file features of the unknown program file; and
- a sending module configured to generate a feedback message according to the signature identifier and the file features, and send the feedback message to the client, wherein the client performs subsequent process on the unknown program file according to the feedback message.
- Optionally, the sending module comprises:
- a matching unit configured to match the signature identifier in a database; and
- a sending unit configured to send a matched killing method to the client.
- Optionally, the database comprises: a local database and/or a cloud database.
- Optionally, the receiving module is further configured to receive from the client file features of the unknown program file.
- Optionally, the sending module is further configured to send a preset detection condition with respect to information parameters of the unknown program file to the client;
- the receiving module is further configured to receive the detection result from the client; and
- the sending module is further configured to send a corresponding instruction according to the detection result.
- Optionally, the sending module is further configured to
- send to the client a reminder message that the unknown program file might be infected with a malicious program according to the detection result; and/or
- send a corresponding command according to the detection result, wherein the corresponding command comprises a killing command of killing the unknown program file and a command of releasing a secure file.
- According to yet another aspect of the invention, there is provided a computer program comprising a computer readable code which causes a computing device to perform the cloud security-based file processing method according to any of claims 1-9, and/or the cloud security-based file processing method according to any of claims 10-15, when said computer readable code is running on the computing device.
- According to still another aspect of the invention, there is provided a computer readable medium storing the above described computer program therein.
- The beneficial effects of the invention lie in that:
- The invention provides a cloud security-based file processing method and apparatus. By the invention, the client can obtain a local unknown program file timely, generate a signature identifier uniquely corresponding to the program file and send it to the server end, and the server end can obtain a corresponding feedback message according to the received signature identifier and return it to the client, and the client performs corresponding process on the unknown program file according to the feedback message.
- It is thus clear that the method and apparatus provided by the invention enables the client to obtain a processing method with respect to an unknown program file from the server side in real time and dynamically, and to kill a malicious program timely, which solves the problem of breaking through the cloud killing by utilizing a Trojan in the prior art. In addition, as compared to that a new malicious program can be only detected and killed by upgrading a local feature library and an engine program file in the prior art, the invention further reduces the time from discovering a malicious program to killing the malicious program, thereby accelerating the speed of fighting against a new malicious program, reducing the information storage amount of the server as well and in turn guaranteeing the security of a client program.
- The above description is merely an overview of the technical solutions of the invention. In the following particular embodiments of the invention will be illustrated in order that the technical means of the invention can be more clearly understood and thus may be embodied according to the content of the specification, and that the foregoing and other objects, features and advantages of the invention can be more apparent.
- Various other advantages and benefits will become apparent to those of ordinary skills in the art by reading the following detailed description of the preferred embodiments. The drawings are only for the purpose of showing the preferred embodiments, and are not considered to be limiting to the invention. And throughout the drawings, like reference signs are used to denote like components. In the drawings:
-
FIG. 1 shows a flow chart of a cloud security-based file processing method according to an embodiment of the invention; -
FIG. 2 shows a flow chart of another cloud security-based file processing method according to an embodiment of the invention; and -
FIG. 3 shows a flow chart of a cloud security-based file processing method according to another embodiment of the invention; -
FIG. 4 shows a structural block diagram of a cloud security-based file processing apparatus according to an embodiment of the invention; -
FIG. 5 shows a structural block diagram of another cloud security-based file processing apparatus according to an embodiment of the invention; -
FIG. 6 shows schematically a block diagram of a computing device for performing a cloud security-based file processing method according to the invention; and -
FIG. 7 shows schematically a storage unit for retaining or carrying a program code implementing a cloud security-based file processing method according to the invention. - In the following the invention will be further described in connection with the drawings and the particular embodiments.
- The algorithms and displays provided here are not inherently related to any specific computer, virtual system or other device. Various general-purpose systems may also be used with the teachings herein. According to the above description, the structure required for constructing such systems is obvious. In addition, the invention is not directed to any specific programming language. It should be understood that the content of the invention described herein may be carried out utilizing various programming languages, and that the above description for a specific language is for the sake of disclosing preferred embodiments of the invention.
- Invention may be applied in a computer system/server, which may be operated together with a multitude of other general- or special-purpose computing system environments or configurations. Examples of well known computing systems, environments and/or configurations suitable for use with a computer system/server comprise, but not limited to, a personal computer system, a server computer system, a thin client, a thick client, a hand held or laptop device, a microprocessor-based system, a set-top box, a programmable consumer electronic product, a network personal computer, a small computer system, a large computer system and a distributed cloud computing environment comprising the any above system, etc.
- A computer system/server may be described in the general context of a computer system executable instruction (such as a program module) executed by a computer system. In general, the program module may comprise a routine, a program, target program, component, logic, data structure, etc., which performs a specific task or implements a specific abstract data type. The computer system/server may be embodied in a distributed cloud computing environment, and in the distributed cloud computing environment, a task is performed by a remote processing device linked by a communication network. In the distributed cloud computing environment, the program module may be located on a local or remote computing system storage medium comprising a storage device.
-
FIG. 1 shows a flow chart of a cloud security-based file processing method according to an embodiment of the invention. In this method, the client for processing a local program is improved, and the method specifically comprises the steps S102 to S106. - S102: generating a signature identifier uniquely corresponding to an unknown program file downloaded locally according to signature related information of the unknown program file.
- S104: sending a query request to a server end to query whether the unknown program file is a malicious program or not, wherein the query request carries the signature identifier of the unknown program file and a part or all of the file features of the unknown program file.
- Therein, the file features in this embodiment may comprise the MD5 value, the SHA1 value of a file, or a feature value calculated according to part of the content extracted from the file. They may further comprise information on a DLL (Dynamic Link Library) that might be loaded by the file and description information on the DLL, whether the file is infected by a Trojan to be a file of which the security is unknown or a dangerous file; or comprise judging whether a specified file/directory exists, whether an attribute of the file meets a condition (for example, whether the MD5 of the file is a specified value), whether a specified registry key/value exists, whether the content of the registry key/value meets a condition, whether a specified process/service exists, or the like.
- Therein, a corresponding relationship between a file feature value and security level information is pre-stored at the server end. The security level information determined by the server end may be customized, for example, comprise a level such as secure, dangerous, unknown, etc., or also may be differentiated by employing a way of a first level, a second level, a third level, etc., as long as it can reflect whether an individual module is secure or not. Or, the security rank information comprises: the secure level, the unknown level, the suspicious level, the highly suspicious level and the malicious level, wherein the malicious level is the highest level, the secure level is the lowest level. For example, a level when it is 10-20 may be set to be the secure level, a level when it is 30-40 may be set to be the unknown level, a level when it is 50-60 may be set to be the suspicious level and the highly suspicious level, and a level when it is greater than 70 may be set to be the malicious level.
- S106: receiving a feedback message from the server end, and performing subsequent process on the unknown program file according to the feedback message, wherein the server end generates the feedback message according to the signature identifier and the file features.
- In this embodiment, the feedback message is a killing method fed back by the server end and corresponding to the signature identifier, such that the client can perform corresponding process on the unknown file according to the killing method.
- The cloud security-based file processing method provided by the embodiment of the invention enables the client to obtain a local unknown program file timely, generate a signature identifier uniquely corresponding to the program file and send it to the server end, obtain a corresponding feedback message from the server end, and perform corresponding process on the unknown program file according to the feedback message.
- It is thus clear that the method provided by the embodiment of the invention enables the client to obtain a processing method with respect to an unknown program file from the server side in real time and dynamically, and to kill a malicious program timely, which solves the problem of breaking through the cloud killing by utilizing a Trojan in the prior art. In addition, as compared to that a new malicious program can be only detected and killed by upgrading a local feature library and an engine program file in the prior art, the method further reduces the time from discovering a malicious program to killing the malicious program, thereby accelerating the speed of fighting against a new malicious program, reducing the information storage amount of the server as well and in turn guaranteeing the security of a client program.
- Correspondingly,
FIG. 2 shows a flow chart of another cloud security-based file processing method according to an embodiment of the invention. In this method, the server for killing a malicious program is improved, the server is a cloud security server for the client above, and the method specifically comprises the steps S202 to S206. - S202: receiving a query request from a client, wherein the query request comprises the signature identifier of an unknown program file and a part or all of the file features of the unknown program file. The file features in this embodiment have already been specifically introduced in the above-described method, and will not be repeated here.
- S204: generating a feedback message according to the signature identifier and the file features.
- S206: sending the feedback message to the client, wherein the client performs subsequent process on the unknown program file according to the feedback message.
- For example, in this embodiment, when the client Thunder's ThundPlatform.exe loads minizip.dll (minizip.dll is replaced with a Trojan), and it is detected that minizip is not a white file (also called a white program or a trusted program), the server returns a command of deleting the Trojan, and the operation of repairing the Thunder software is performed, which may be performed by the client.
- The cloud security-based file processing method provided by the embodiment of the invention enables the server to obtain a corresponding feedback message according to the signature identifier of an unknown program file sent by the client and return it to the client, and the client performs corresponding process on the unknown program file according to the feedback message
- It is thus clear that the method provided by the embodiment of the invention enables the server to obtain a processing method with respect to an unknown program file of the client in real time and dynamically, and the client kills a malicious program, which solves the problem of breaking through the cloud killing by utilizing a Trojan in the prior art. In addition, as compared to that a new malicious program can be only detected and killed by upgrading a local feature library and an engine program file in the prior art, the method further reduces the time from discovering a malicious program to killing the malicious program, thereby accelerating the speed of fighting against a new malicious program, reducing the information storage amount of the server as well and in turn guaranteeing the security of a client program.
- This embodiment is a specific application scenario of the above described embodiment One, and by this embodiment, the method provided by the invention can be set forth more clearly and specifically.
-
FIG. 3 shows a flow chart of a cloud security-based file processing method in an embodiment of the invention. The method specifically comprises the step S302 to S316. - S302: a client generates a signature identifier uniquely corresponding to an unknown program file downloaded locally according to signature related information of the unknown program file.
- It needs to be noted that in this embodiment, when executing a local program file, the client will judge whether each program file is a local known program file to guarantee the knowability of a local program to the client and meanwhile ensure the security of a local program. Therein, a list of program files will be stored in the client, and when a scanned program file is not in the list of program files, the client will judge the program file to be an unknown program file.
- Optionally, a specific way of implementing the step comprises:
- firstly, scanning the unknown program file to obtain the file features,
- wherein the file features have been specifically introduced in the above embodiment, and will not be repeated here;
- secondly, extracting the signature related information from the obtained file features,
- wherein the signature related information is the computable field of the file features, and the computable field comprises the remaining part in a PE file except the PE check segment, the signature segment and the signature content, wherein when the length of the obtained file does not reach an integer multiple of 8, the number of bits that it lacks is supplemented with 0 to facilitate its computation;
- thirdly, computing the computable field and taking the computation result as the signature identifier.
- Optionally, in this embodiment, the computable field is taken as a digest value, and it is computed employing the SHA1 algorithm to obtain a signature identifier uniquely corresponding to the unknown program file.
- After generating the signature identifier of the unknown program file, the client performs the step S304, namely, sends a query request to a server end. Therein, the query request carries the signature identifier of the unknown program file and a part or all of the file features of the unknown program file.
- After receiving the query request, the server end performs the step S306, that is, matches the signature identifier in the query request in a database to obtain a killing method corresponding to the signature identifier.
- It needs to be noted that, the database in this embodiment comprises a local database and/or a cloud database.
- Optionally, the killing method in this embodiment may comprise a scanning/judging action and a repair action, etc. Therein, the scanning/judging action comprises scanning and judging an attribute of a program file and the context of the program file, and when it is judged to be a malicious program, performing a corresponding repair operation. Optionally, the repair operation may comprise deleting a specified registry key/value, modifying a registry key/value to be specified content, deleting a specified system service item, repairing/deleting a specified program file, etc., and further comprises guiding a user to start a first aid kit, etc., for example, killing a malicious program in the first aid kit mode, employing a multilayer detection and removal way for the computer basic input/output system→the hard disk master boot record→the operating system driver layer→the operating system application layer, to perform detection and removal process on a virus starting from the bottom layer, which may ensure thorough removal of viruses existing in individual layers from the application layer to the driver layer, improve the ability of detecting and removing a computer virus and guarantee the security of the computer system.
- S308: the server sends the matched killing method to the client.
- After receiving the killing method sent by the server, the client performs the step S310, that is, downloads from the server side a detection condition with respect to information parameters of the unknown program file, wherein the detection condition is generated by the server side according to received information parameters (e.g., the file features) of the unknown program file.
- After downloading the detection condition, the client performs the step S312, that is, judges whether the unknown program file meets the detection condition, and sends the judgment result to the server.
- Optionally, the detection condition in this embodiment comprises at least one of the following:
- 1) whether a specific file loaded by the PE has an effective signature of a specific company; 2) whether the internal name, product name and company name of a specific file loaded by the PE are specified names; 3) whether a specific hook is mounted in the system; 4) whether there is specific filling data in a specific process; 5) whether there exists a specific driver module or device object in the system, wherein the specific driver module or device object refers to a driver module or device object loaded by a local unknown program; 6) whether a specific registry points to a specific file or a specific CLSID or matches a specific mode, wherein the specific registry, the specific file, the specific CLSID and the specific mode are all generated by an unknown program at the time of loading, and when the program is run, the program is run by the specific registry in the specific mode utilizing the specific file and the specific CLSID; and 7) whether a local unknown file (a file of which the security rank can not be judged to be trusted, which is mainly judged according to the file security rank corresponding to each file) exists in a process chain loaded by the PE, and so on. The reason why PE loads a process chain is that it is necessary to analyze information on the process chain.
- The process chain comprises all the parent/child processes that run the program operations. For example, an example of a process chain is: process 1→process 2→process 3, that is, the process 2 is the parent process of the process 3, the process 1 is the parent process of the process 2, the process 2 is the child process of the process 1, and the process 3 is the child process of the process 2. Names of all the processes on the process chain are extracted to determine whether a local unknown file exists. With respect to a parent process and a child process, when creating a process, a function that is created is a child process of the creating function. The information on the process may further comprise other information, for example, the session ID, the priority, a possessed thread, the user's ID, the handler, the process memory counter, the process path, the process command line parameter, the process name, the process creator, the creation time, the exit time, the kernel time, etc., and the invention will not introduce it in detail any more. Starting from the current process, the process chain corresponding to the current process is traced according to the creation relationship, a parent process at each level is searched successively in the process chain, and the file rank of the parent process is obtained; according to the obtained file rank, it can be known whether a local unknown file exists in the process chain loaded by the PE.
- For the first kind of detection condition, it may be queried out that the WindStorm StoreUpdate.exe has loaded StormUpdate.dll, and StormUpdate.dll has the signature information of “Beijing Storm Internet Technology Co., Ltd.”.
- For the second kind of detection condition, for example, it is detected that kernel32.dll has been loaded, the internal name is kernel32, the company name is Microsoft, the product name is Microsoft@Windows@Operating System, and so on.
- For the detection condition of whether a specific hook is mounted in the system, for example, a shutdown callback hook function is one or more callback function that will be invoked when Windows is shut down, and after a Trojan is registered, it may write itself from the memory to a disk and set self-startup at the time of shutdown, such that it still can be loaded when the computer is powered on the next time. A common Trojan sample Unifade can be infected repeatedly by registering a shutdown callback hook.
- As another example, for the detection condition of whether there exists a specific driver module or device object in the system, svchost.ext is a common system service process, a Trojan will inject its own module into the process remotely, delete its own file to achieve the purpose of stealth, and write itself to a disk at the time of shutdown so as to be loaded when the computer is powered on the next time. An analyzer may extract some binary strings according to features of a Trojan, match these binary strings with the memory of the svchost.exe process and thereby find out the Trojan.
- As another example, for the detection condition of whether a specific registry points to a specific file or a specific CLSID or matches a specific mode, for a specific registry, for example, the Ghost Trojan infects the fips.sys driver, the fips driver is loaded by the key HKLM\SYSTEM\CurrentControlSet\Services\Fips, thereby detecting that fips.sys is infected, and meanwhile the object \Driver\fips exists, which may be taken as a condition for judging that the Ghost Trojan virus exists, and so on.
- After receiving the detection result, the server performs the step S314, that is, obtains a corresponding instruction according to the detection result, and sends the instruction to the client.
- Optionally, a list of instructions or an instruction database is stored at the server side, which stores processing instructions for different detection results. For example, when the server judges that the unknown program file is a malicious file according to the received detection result, it may send to the client a reminder message that the unknown program file might be infected with a malicious program, or also may send an instruction of killing the unknown program file. When the server judges that the unknown program file is a secure file according to the received detection result, it sends to the client a command of releasing the secure file.
- After receiving the instruction sent by the server, the client performs the step S316, that is, performs subsequent process on the unknown program file according to the obtained instruction.
- Optionally, in this embodiment, when the instruction received by the client is a reminder message that the unknown program file might be infected with a malicious program, it may show the user reminder information that the unknown program file might be infected with a malicious program, to facilitate the user to perform an operation on the program file. For example, the user may choose to kill the program file according to the reminder message, and at this point, after receiving a killing instruction triggered by the user, the client forwards the program file to the server side for killing, which reduces the killing operation of the file by the client and increases the processing speed of the client.
- When the instruction received by the client is a killing instruction, it directly kills the unknown program file according to the instruction, which guarantees timely killing of a malicious program.
- The invention provides a cloud security-based file processing method. By the invention, the client can obtain a local unknown program file timely, generate a signature identifier uniquely corresponding to the program file and send it to the server end, and the server end can obtain a corresponding feedback message according to the received signature identifier and return it to the client, and the client performs corresponding process on the unknown program file according to the feedback message.
- It is thus clear that the method provided by the invention enables the client to obtain a processing method with respect to an unknown program file from the server side in real time and dynamically, and to kill a malicious program timely, which solves the problem of breaking through the cloud killing by utilizing a Trojan in the prior art. For example, a problem is solved that a Trojan uses a DLL hijacking technique to pack a Trojan DLL and a trustable white program together and when the user executes the white program, the Trojan DLL will be loaded.
- In addition, as compared to that a new malicious program can be only detected and killed by upgrading a local feature library and an engine program file in the prior art, the method further reduces the time from discovering a malicious program to killing the malicious program, thereby accelerating the speed of fighting against a new malicious program, reducing the information storage amount of the server as well and in turn guaranteeing the security of a client program. The method may be effectively applied to a virus that infects the application layer or the driver layer, and involved viruses that may be processed comprise computer viruses (comprising a general infectious virus, a Word and Excel macro virus, a boot sector virus, a script virus, a Trojan, a backdoor program, a keylogger, a password stealer, etc., which are collectively called “computer viruses”).
-
FIG. 4 shows a structural block diagram of a cloud security-based file processing apparatus in an embodiment of the invention. The apparatus is implemented in an engine of a client. The apparatus 400 comprises: - a
generating module 410 configured to generate a signature identifier uniquely corresponding to an unknown program file downloaded locally according to signature related information of the unknown program file; - a
query module 420 coupled with thegenerating module 410 and configured to send a query request to a server end to query whether the unknown program file is a malicious program or not, wherein the query request carries the signature identifier of the unknown program file and a part or all of the file features of the unknown program file; and - a
processing module 430 coupled with thequery module 420 and configured to receive a feedback message from the server end, and perform subsequent process on the unknown program file according to the feedback message, wherein the server end generates the feedback message according to the signature identifier and the file features. - Optionally, the apparatus further comprises:
- an extracting
module 440 coupled with thegenerating module 410 and configured to scan the unknown program file to obtain the file features; and - extract the signature related information from the file features.
- Optionally, the file features comprise at least one of the following:
- the MD5, SHA1, and a feature value calculated according to part of the content extracted from the file.
- Optionally, the
generating module 410 is further configured to: - obtain the computable field of a portable executable PE file, wherein the computable field is the remaining part in the PE file except the PE check segment, the signature segment and the signature content; and
- compute the computable field and take the computation result as the signature identifier.
- Optionally, the
processing module 430 is further configured to: - receive a killing method fed back by the server end and corresponding to the signature identifier when the signature identifier is matched at the server end successfully.
- Optionally, the
processing module 430 is further configured to: - download from the server end a preset detection condition with respect to information parameters of the unknown program file, and judge whether the unknown program file meets the detection condition; and
- upload the judgment result to the server end and perform subsequent process according to an instruction of the server end.
- Optionally, the
processing module 430 is further configured to: - receive from the server end a reminder message that the unknown program file might be infected with a malicious program; and/or
- kill the unknown program file when receiving from the server end a killing command of killing the unknown program file; and/or
- kill the unknown program file by the server end when receiving a killing instruction triggered in a user interface.
- Optionally, the killing method comprises: performing a scanning/judging action and/or a repair action on the unknown program file.
-
FIG. 5 shows a structural block diagram of another cloud security-based file processing apparatus in an embodiment of the invention. The apparatus is implemented in a peer server of the client. The apparatus 500 comprises: - a
receiving module 510 configured to receive a query request from a client, wherein the query request comprises the signature identifier of an unknown program file and a part or all of the file features of the unknown program file; and - a sending
module 520 coupled with the receivingmodule 510 and configured to generate a feedback message according to the signature identifier and the file features, and send the feedback message to the client, wherein the client performs subsequent process on the unknown program file according to the feedback message. - Optionally, the sending
module 520 comprises: - a matching unit 521 configured to match the signature identifier in a database; and
- a sending
unit 522 configured to send a matched killing method to the client. - Optionally, the database comprises: a local database and/or a cloud database.
- Optionally, the receiving
module 510 is further configured to receive from the client file features of the unknown program file. - Optionally, the sending
module 520 is further configured to send a preset detection condition with respect to information parameters of the unknown program file to the client; - the receiving
module 510 is further configured to receive the detection result from the client; and - the sending
module 520 is further configured to sending a corresponding instruction according to the detection result. - Optionally, the sending
module 520 is further configured to - send to the client a reminder message that the unknown program file might be infected with a malicious program according to the detection result; and/or
- send a corresponding command according to the detection result, wherein the corresponding command comprises a killing command of killing the unknown program file and a command of releasing a secure file.
- The embodiment of the invention provides a cloud security-based file processing apparatus. By the apparatus, the client can obtain a local unknown program file timely, generate a signature identifier uniquely corresponding to the program file and send it to the server end, and the server end can obtain a corresponding feedback message according to the received signature identifier and return it to the client, and the client performs corresponding processing on the unknown program file according to the feedback message.
- It is thus clear that the apparatus provided by the invention enables the client to obtain a processing method with respect to an unknown program file from the server side in real time and dynamically, and to kill a malicious program timely, which solves the problem of breaking through the cloud killing by utilizing a Trojan in the prior art. In addition, as compared to that a new malicious program can be only detected and killed by upgrading a local feature library and an engine program file in the prior art, the apparatus further reduces the time from discovering a malicious program to killing the malicious program, thereby accelerating the speed of fighting against a new malicious program, reducing the information storage amount of the server as well and in turn guaranteeing the security of a client program.
- In the specification provided herein, a plenty of particular details are described. However, it can be appreciated that an embodiment of the invention may be practiced without these particular details. In some embodiments, well known methods, structures and technologies are not illustrated in detail so as not to obscure the understanding of the specification.
- Similarly, it shall be appreciated that in order to simplify the disclosure and help the understanding of one or more of all the inventive aspects, in the above description of the exemplary embodiments of the invention, sometimes individual features of the invention are grouped together into a single embodiment, figure or the description thereof. However, the disclosed methods should not be construed as reflecting the following intention, namely, the claimed invention claims more features than those explicitly recited in each claim. More precisely, as reflected in the following claims, an aspect of the invention lies in being less than all the features of individual embodiments disclosed previously. Therefore, the claims complying with a particular implementation are hereby incorporated into the particular implementation, wherein each claim itself acts as an individual embodiment of the invention.
- It may be appreciated to those skilled in the art that modules in a device in an embodiment may be changed adaptively and arranged in one or more device different from the embodiment. Modules or units or assemblies may be combined into one module or unit or assembly, and additionally, they may be divided into multiple sub-modules or sub-units or subassemblies. Except that at least some of such features and/or procedures or units are mutually exclusive, all the features disclosed in the specification (including the accompanying claims, abstract and drawings) and all the procedures or units of any method or device disclosed as such may be combined employing any combination. Unless explicitly stated otherwise, each feature disclosed in the specification (including the accompanying claims, abstract and drawings) may be replaced by an alternative feature providing an identical, equal or similar objective.
- Furthermore, it can be appreciated to the skilled in the art that although some embodiments described herein comprise some features and not other features comprised in other embodiment, a combination of features of different embodiments is indicative of being within the scope of the invention and forming a different embodiment. For example, in the following claims, any one of the claimed embodiments may be used in any combination.
- Embodiments of the individual components of the invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof. It will be appreciated by those skilled in the art that, in practice, some or all of the functions of some or all of the components in a cloud security-based file processing apparatus according to individual embodiments of the invention may be realized using a microprocessor or a digital signal processor (DSP). The invention may also be implemented as a device or apparatus program (e.g., a computer program and a computer program product) for carrying out a part or all of the method as described herein. Such a program implementing the invention may be stored on a computer readable medium, or may be in the form of one or more signals. Such a signal may be obtained by downloading it from an Internet website, or provided on a carrier signal, or provided in any other form.
- For example, the invention shows a computing device which may carry out a first cloud security-based file processing method according to the invention, e.g., a client, and a computing device which may carry out a second cloud security-based file processing method according to the invention, e.g., a common application server. With reference to
FIG. 6 , the computing device traditionally comprises aprocessor 610 and a computer program product or a computer readable medium in the form of amemory 620. Thememory 620 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read-only memory), an EPROM, a hard disk or a ROM. Thememory 620 has amemory space 630 for aprogram code 631 for carrying out any method steps in the methods as described above. For example, thememory space 630 for a program code may compriseindividual program codes 631 for carrying out individual steps in the above methods, respectively. The program codes may be read out from or written to one or more computer program products. These computer program products comprise such a program code carrier as a hard disk, a compact disk (CD), a memory card or a floppy disk. Such a computer program product is generally a portable or stationary storage unit as described with reference toFIG. 7 . The storage unit may have a memory segment, a memory space, etc. arranged similarly to thememory 620 in the server ofFIG. 6 . The program code may for example be compressed in an appropriate form. In general, the storage unit comprises a computerreadable code 631′, i.e., a code which may be read by e.g., a processor such as 610, and when run by a computing device, the codes cause the computing device to carry out individual steps in the methods described above. - “An embodiment”, “the embodiment” or “one or more embodiments” mentioned herein implies that a particular feature, structure or characteristic described in connection with an embodiment is included in at least one embodiment of the invention. In addition, it is to be noted that, examples of a phrase “in an embodiment” herein do not necessarily all refer to one and the same embodiment.
- It is to be noted that the above embodiments illustrate rather than limit the invention, and those skilled in the art may design alternative embodiments without departing the scope of the appended claims. In the claims, any reference sign placed between the parentheses shall not be construed as limiting to a claim. The word “comprise” does not exclude the presence of an element or a step not listed in a claim. The word “a” or “an” preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of a hardware comprising several distinct elements and by means of a suitably programmed computer. In a unit claim enumerating several apparatuses, several of the apparatuses may be embodied by one and the same hardware item. Use of the words first, second, and third, etc. does not mean any ordering. Such words may be construed as naming.
- Furthermore, it is also to be noted that the language used in the description is selected mainly for the purpose of readability and teaching, but not selected for explaining or defining the subject matter of the invention. Therefore, for those of ordinary skills in the art, many modifications and variations are apparent without departing the scope and spirit of the appended claims. For the scope of the invention, the disclosure of the invention is illustrative, but not limiting, and the scope of the invention is defined by the appended claims.
Claims (17)
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310219053.8 | 2013-06-04 | ||
CN201310219053 | 2013-06-04 | ||
CN201310219053.8A CN103281325B (en) | 2013-06-04 | 2013-06-04 | Document handling method and device based on cloud security |
PCT/CN2014/079076 WO2014194803A1 (en) | 2013-06-04 | 2014-06-03 | Cloud security-based file processing method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
US20160119375A1 true US20160119375A1 (en) | 2016-04-28 |
US9948670B2 US9948670B2 (en) | 2018-04-17 |
Family
ID=49063772
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/896,298 Active 2034-10-01 US9948670B2 (en) | 2013-06-04 | 2014-06-03 | Cloud security-based file processing by generating feedback message based on signature information and file features |
Country Status (3)
Country | Link |
---|---|
US (1) | US9948670B2 (en) |
CN (1) | CN103281325B (en) |
WO (1) | WO2014194803A1 (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160364566A1 (en) * | 2014-09-23 | 2016-12-15 | Intel Corporation | Technologies for multi-factor security analysis and runtime control |
US20170286671A1 (en) * | 2016-03-31 | 2017-10-05 | International Business Machines Corporation | Detecting Malicious User Activity |
US10176320B1 (en) * | 2017-12-04 | 2019-01-08 | Honeywell International Inc. | Using machine learning in an industrial control network to improve cybersecurity operations |
CN110263001A (en) * | 2019-06-18 | 2019-09-20 | 深圳前海微众银行股份有限公司 | File management method, device, system, equipment and computer readable storage medium |
CN110351390A (en) * | 2019-08-14 | 2019-10-18 | 合肥美菱物联科技有限公司 | Method, intelligent refrigerator, Cloud Server and the system of intelligent refrigerator addition function |
CN110351392A (en) * | 2019-08-23 | 2019-10-18 | 易联众智能(厦门)科技有限公司 | A kind of long-range control method, system and the readable medium of multiple terminals Internet of Things |
CN110955891A (en) * | 2018-09-26 | 2020-04-03 | 阿里巴巴集团控股有限公司 | File detection method, device and system and data processing method |
US11258789B2 (en) * | 2018-12-04 | 2022-02-22 | Forcepoint Llc | System and method for fingerprint validation |
CN114172890A (en) * | 2021-11-03 | 2022-03-11 | 阿里巴巴(中国)有限公司 | File second-pass processing method and device, storage medium and electronic equipment |
CN114315196A (en) * | 2021-11-23 | 2022-04-12 | 攀钢集团研究院有限公司 | Method for recovering silicon-phosphorus thermal insulation material from alkaline vanadium-containing liquid |
CN114765606A (en) * | 2020-12-30 | 2022-07-19 | 中国联合网络通信集团有限公司 | Container mirror image transmission method, device, equipment and storage medium |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103281325B (en) | 2013-06-04 | 2018-03-02 | 北京奇虎科技有限公司 | Document handling method and device based on cloud security |
CN104915593B (en) * | 2014-03-14 | 2018-03-16 | 北京奇虎科技有限公司 | Binding processing method and system are gone to software |
CN105279019B (en) * | 2014-06-10 | 2018-11-23 | 中国移动通信集团公司 | A kind of dispatching method of application program, device and terminal device |
WO2016053829A1 (en) * | 2014-10-01 | 2016-04-07 | 3M Innovative Properties Company | Porous devices, kits, and methods for debridement |
CN104462968B (en) * | 2014-12-16 | 2017-11-10 | 北京奇虎科技有限公司 | Scan method, the device and system of malicious application |
CN105791250B (en) * | 2014-12-26 | 2020-10-02 | 北京奇虎科技有限公司 | Application program detection method and device |
CN104537304B (en) * | 2014-12-31 | 2017-04-12 | 北京奇安信科技有限公司 | File checking and killing method, device and system |
CN106934286B (en) * | 2015-12-31 | 2020-02-04 | 北京金山安全软件有限公司 | Safety diagnosis method and device and electronic equipment |
WO2018021163A1 (en) * | 2016-07-27 | 2018-02-01 | 日本電気株式会社 | Signature creation device, signature creation method, recording medium in which signature creation program is recorded, and software determination system |
CN107689975B (en) * | 2016-08-05 | 2020-07-31 | 腾讯科技(深圳)有限公司 | Cloud computing-based computer virus identification method and system |
CN107085685B (en) * | 2017-05-16 | 2020-06-30 | 华讯高科股份有限公司 | Operation method of platform data |
CN107633173B (en) * | 2017-09-06 | 2021-08-17 | 北京金山安全管理系统技术有限公司 | File processing method and device |
CN109800775B (en) * | 2017-11-17 | 2022-10-28 | 腾讯科技(深圳)有限公司 | File clustering method, device, equipment and readable medium |
CN108108619B (en) * | 2017-12-29 | 2021-08-31 | 安天科技集团股份有限公司 | File detection method, system and storage medium based on pattern matching corresponding relation |
CN109086608A (en) * | 2018-07-20 | 2018-12-25 | 西安四叶草信息技术有限公司 | A kind of detection file uploads method, terminal device and the server of loophole |
CN111030969A (en) * | 2019-02-26 | 2020-04-17 | 北京安天网络安全技术有限公司 | Threat detection method and device based on visible and non-visible data and storage equipment |
CN112084495A (en) * | 2019-06-14 | 2020-12-15 | 北京奇虎科技有限公司 | Process chain analysis method and device |
CN111858486B (en) * | 2020-07-03 | 2024-07-23 | 北京天空卫士网络安全技术有限公司 | File classification method and device |
CN111931177B (en) * | 2020-07-16 | 2023-12-29 | 深信服科技股份有限公司 | Information processing method, apparatus, electronic device, and computer storage medium |
CN113971804A (en) * | 2020-07-24 | 2022-01-25 | 中国移动通信集团浙江有限公司 | Signature falsification detection device and method, computing device and storage medium |
CN112380538A (en) * | 2020-11-10 | 2021-02-19 | 广东电力信息科技有限公司 | Internet information risk prompting method and monitoring system |
CN114866532B (en) * | 2022-04-25 | 2023-11-10 | 安天科技集团股份有限公司 | Method, device, equipment and medium for uploading security check result information of endpoint file |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050172324A1 (en) * | 2004-01-30 | 2005-08-04 | Shlomo Touboul | Method and system for embedding messages within HTTP |
US20070028110A1 (en) * | 2005-07-29 | 2007-02-01 | Bit 9, Inc. | Content extractor and analysis system |
US7895651B2 (en) * | 2005-07-29 | 2011-02-22 | Bit 9, Inc. | Content tracking in a network security system |
US20110246741A1 (en) * | 2010-04-01 | 2011-10-06 | Oracle International Corporation | Data deduplication dictionary system |
US20120117648A1 (en) * | 2009-04-09 | 2012-05-10 | F-Secure Corporation | Malware Determination |
US8572730B1 (en) * | 2011-02-28 | 2013-10-29 | Symantec Corporation | Systems and methods for revoking digital signatures |
US8590039B1 (en) * | 2007-11-28 | 2013-11-19 | Mcafee, Inc. | System, method and computer program product for sending information extracted from a potentially unwanted data sample to generate a signature |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7490352B2 (en) * | 2005-04-07 | 2009-02-10 | Microsoft Corporation | Systems and methods for verifying trust of executable files |
CN101594248A (en) * | 2008-05-27 | 2009-12-02 | 奇智软件技术(北京)有限公司 | The remote assistance method of information security and system maintenance, system and server |
CN101719846A (en) * | 2008-10-09 | 2010-06-02 | 中国移动通信集团天津有限公司 | Security monitoring method, device and system |
US8832829B2 (en) * | 2009-09-30 | 2014-09-09 | Fireeye, Inc. | Network-based binary file extraction and analysis for malware detection |
CN102663288B (en) * | 2012-03-22 | 2015-04-01 | 北京奇虎科技有限公司 | Virus killing method and device thereof |
CN102693388B (en) * | 2012-06-07 | 2014-03-19 | 腾讯科技(深圳)有限公司 | Data safety protection processing system, method and storage medium |
CN103281325B (en) * | 2013-06-04 | 2018-03-02 | 北京奇虎科技有限公司 | Document handling method and device based on cloud security |
-
2013
- 2013-06-04 CN CN201310219053.8A patent/CN103281325B/en active Active
-
2014
- 2014-06-03 US US14/896,298 patent/US9948670B2/en active Active
- 2014-06-03 WO PCT/CN2014/079076 patent/WO2014194803A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050172324A1 (en) * | 2004-01-30 | 2005-08-04 | Shlomo Touboul | Method and system for embedding messages within HTTP |
US20070028110A1 (en) * | 2005-07-29 | 2007-02-01 | Bit 9, Inc. | Content extractor and analysis system |
US7895651B2 (en) * | 2005-07-29 | 2011-02-22 | Bit 9, Inc. | Content tracking in a network security system |
US8590039B1 (en) * | 2007-11-28 | 2013-11-19 | Mcafee, Inc. | System, method and computer program product for sending information extracted from a potentially unwanted data sample to generate a signature |
US20120117648A1 (en) * | 2009-04-09 | 2012-05-10 | F-Secure Corporation | Malware Determination |
US20110246741A1 (en) * | 2010-04-01 | 2011-10-06 | Oracle International Corporation | Data deduplication dictionary system |
US8572730B1 (en) * | 2011-02-28 | 2013-10-29 | Symantec Corporation | Systems and methods for revoking digital signatures |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10055580B2 (en) * | 2014-09-23 | 2018-08-21 | Intel Corporation | Technologies for multi-factor security analysis and runtime control |
US20160364566A1 (en) * | 2014-09-23 | 2016-12-15 | Intel Corporation | Technologies for multi-factor security analysis and runtime control |
US10599837B2 (en) * | 2016-03-31 | 2020-03-24 | International Business Machines Corporation | Detecting malicious user activity |
US20170286671A1 (en) * | 2016-03-31 | 2017-10-05 | International Business Machines Corporation | Detecting Malicious User Activity |
US10891371B2 (en) | 2016-03-31 | 2021-01-12 | International Business Machines Corporation | Detecting malicious user activity |
US10176320B1 (en) * | 2017-12-04 | 2019-01-08 | Honeywell International Inc. | Using machine learning in an industrial control network to improve cybersecurity operations |
CN110955891A (en) * | 2018-09-26 | 2020-04-03 | 阿里巴巴集团控股有限公司 | File detection method, device and system and data processing method |
US11258789B2 (en) * | 2018-12-04 | 2022-02-22 | Forcepoint Llc | System and method for fingerprint validation |
CN110263001A (en) * | 2019-06-18 | 2019-09-20 | 深圳前海微众银行股份有限公司 | File management method, device, system, equipment and computer readable storage medium |
CN110351390A (en) * | 2019-08-14 | 2019-10-18 | 合肥美菱物联科技有限公司 | Method, intelligent refrigerator, Cloud Server and the system of intelligent refrigerator addition function |
CN110351392A (en) * | 2019-08-23 | 2019-10-18 | 易联众智能(厦门)科技有限公司 | A kind of long-range control method, system and the readable medium of multiple terminals Internet of Things |
CN114765606A (en) * | 2020-12-30 | 2022-07-19 | 中国联合网络通信集团有限公司 | Container mirror image transmission method, device, equipment and storage medium |
CN114172890A (en) * | 2021-11-03 | 2022-03-11 | 阿里巴巴(中国)有限公司 | File second-pass processing method and device, storage medium and electronic equipment |
CN114315196A (en) * | 2021-11-23 | 2022-04-12 | 攀钢集团研究院有限公司 | Method for recovering silicon-phosphorus thermal insulation material from alkaline vanadium-containing liquid |
Also Published As
Publication number | Publication date |
---|---|
CN103281325A (en) | 2013-09-04 |
US9948670B2 (en) | 2018-04-17 |
WO2014194803A1 (en) | 2014-12-11 |
CN103281325B (en) | 2018-03-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9948670B2 (en) | Cloud security-based file processing by generating feedback message based on signature information and file features | |
US10972488B2 (en) | Method and system for modeling all operations and executions of an attack and malicious process entry | |
US11068591B2 (en) | Cybersecurity systems and techniques | |
US9135443B2 (en) | Identifying malicious threads | |
JP5976020B2 (en) | System and method for performing anti-malware metadata lookup | |
US10462160B2 (en) | Method and system for identifying uncorrelated suspicious events during an attack | |
US8745743B2 (en) | Anti-virus trusted files database | |
US20180082061A1 (en) | Scanning device, cloud management device, method and system for checking and killing malicious programs | |
US20140310807A1 (en) | Cloud-based secure download method | |
GB2531514B (en) | Malware detection method | |
US11522885B1 (en) | System and method for information gain for malware detection | |
WO2015007224A1 (en) | Malicious program finding and killing method, device and server based on cloud security | |
WO2015081791A1 (en) | Method and apparatus for scanning and removing kernel-level malware | |
WO2015109912A1 (en) | Buffer overflow attack detection device and method and security protection system | |
US9378367B2 (en) | Systems and methods for identifying a source of a suspect event | |
US10880316B2 (en) | Method and system for determining initial execution of an attack | |
JP6169497B2 (en) | Connection destination information determination device, connection destination information determination method, and program | |
WO2016095671A1 (en) | Method and device for processing application-based message | |
CN102982280B (en) | Stop method and the device of computer aided design cad virus infections | |
US8918873B1 (en) | Systems and methods for exonerating untrusted software components | |
US12001545B2 (en) | Detecting stack pivots using stack artifact verification | |
US20240283814A1 (en) | Detection and prevention of sideloaded attack chains via cloud and fuzzy hashing | |
CN113886892A (en) | Data acquisition method and device for application program, storage medium and electronic equipment | |
Mulukutla | Wolfsting: Extending Online Dynamic Malware Analysis Systems by Engaging Malware. | |
THREATS | D08 (D4. 1) Specification language for code behavior |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED, CHINA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KONG, QINGLONG;YAO, TONG;ZHANG, BO;AND OTHERS;REEL/FRAME:037217/0102 Effective date: 20151203 |
|
AS | Assignment |
Owner name: BEIJING QIHOO TECHNOLOGY COMPANY LIMITED, CHINA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE 5TH INVENTOR'S NAME AND ASSIGNEE ADDRESS PREVIOUSLY RECORDED AT REEL: 037217 FRAME: 0102. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNORS:KONG, QINGLONG;YAO, TONG;ZHANG, BO;AND OTHERS;REEL/FRAME:038602/0185 Effective date: 20151203 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: PETITION RELATED TO MAINTENANCE FEES GRANTED (ORIGINAL EVENT CODE: PTGR); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |